US6507912B1 - Protection of biometric data via key-dependent sampling - Google Patents
Protection of biometric data via key-dependent sampling Download PDFInfo
- Publication number
- US6507912B1 US6507912B1 US09/238,700 US23870099A US6507912B1 US 6507912 B1 US6507912 B1 US 6507912B1 US 23870099 A US23870099 A US 23870099A US 6507912 B1 US6507912 B1 US 6507912B1
- Authority
- US
- United States
- Prior art keywords
- key
- dependent
- biometric
- sampling
- computer
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Lifetime
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0866—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
Definitions
- This invention relates to systems, methods and computer program products for identifying and/or verifying an individual, and more specifically to systems, methods and computer program products that use biometric data to identify and/or verify an individual.
- Biometric information is now being used as an identification and/or verification technique for individuals.
- biometric information is one or more behavioral and/or physiological characteristics of an individual.
- Biometric identification and/or verification uses a data processing system to enable automatic identification and/or verification of identity by computer assessment of a biometric characteristic.
- biometric verification biometric information is verified for a known individual.
- biometric identification biometric information for an individual is compared to known biometric information for many individuals in order to identify the individual.
- Biometric identification/verification systems, methods and computer program products can measure one or more of the following behavioral and/or physiological characteristics of an individual: fingerprint, hand geometry, iris pattern, facial features, voice characteristics, handwriting dynamics, earlobe characteristics and keystroke dynamics. Other biometric characteristics may be used.
- Applications using biometric technologies include biometric check cashing machines, payment systems that substitute biometric data for personal identification numbers, access control systems that use biometric data, biometric employee time and attendance recording and biometric passenger control for transportation. Many other applications may utilize biometric information for identification and/or verification. See the publications entitled “ Biometrics, Is it a Viable Proposition for Identity Authentication and Access Control ”, to Kim, Computers & Security, Vol. 14, 1995, pp.
- FIG. 1 is a block diagram of conventional biometric identification and/or verification systems, methods and computer program products.
- biometric identification and/or verification is presented in a “client-server” environment using Internet plug-ins.
- a server is a computer and/or a software program running on a computer and/or special purpose hardware that provides a specific kind of service to a client.
- a client is a computer and/or a software program running on a computer and/or special purpose hardware that is used to contact and obtain data from a server over a communications network.
- the client and server each may comprise one or more mainframe, midrange and/or personal computers and/or one or more applications running on one or more of these computers and/or special purpose hardware.
- the client and server may run on the same computer or on different computers.
- the communications network may be a local area network, a wide area network, the Internet, an application interface and any other communication mechanism that may be used to connect a client and a server.
- a web browser may be used as a client and a web server may be used as a server.
- a client 10 communicates with a server 12 over the Internet 14 .
- the client 10 includes a browser 16
- the server 12 includes a web server 18 .
- a client biometric plug-in 22 and a server biometric script 24 may be used.
- a biometric plug-in for a Netscape browser such as Netscape Communicator or Netscape Navigator
- a Uniform Resource Locator (URL) from the client invokes a script which can include and/or invoke one or more application programs to perform biometric functions.
- URL Uniform Resource Locator
- the client biometric plug-in 22 includes biometric data acquisition 32 that performs sampling of a biometric characteristic at the client to generate samples related to the biometric characteristic.
- an encryption module 34 may use conventional encryption techniques such as the Data Encryption Standard (DES) algorithm to encrypt the samples.
- DES Data Encryption Standard
- Added security may be obtained using a signature module 36 , which may use an RSA public key algorithm or other conventional signature algorithm to add a signature to the encrypted samples.
- the client biometric plug-in transmits encrypted and signed samples, denoted ENC(SAMPLES), SIGNED in FIG. 1, from the client 10 to the server 12 over the Internet 14 using the browser 16 and the web server 18 .
- the server biometric script 24 includes and/or can invoke a signature verification module 46 that verifies the signature, for example using the RSA public key algorithm, and a decryption module 44 that decrypts the encrypted samples, for example using the DES algorithm.
- the samples are then applied to a template compare module 42 which contains therein a plurality of templates T 1 -Tn. Techniques for comparing templates to verify biometric data are well known to those having skill in the art and need not be described further herein.
- the use of encryption and/or signatures may be disadvantageous in biometric applications.
- the biometric data is 1.2K byte fingerprint data that is encrypted on a smart card, and is transmitted to a finger-scan reader for verification
- the RSA signature may take more power and time, and may run the risk of signal corruption.
- DES encryption also may use complex key management techniques in order to establish a common secret encryption key at the client and at the server.
- high security algorithms such as DES and RSA algorithms may increase the cost and/or complexity of the overall biometric application. As the cost of biometric technology decreases, the cost of security may become a dominant factor in inhibiting the widespread use of biometric technology.
- the present invention stems from a realization that in order to transmit biometric data from a client to a server, a biometric characteristic is generally sampled at the client. By sampling the biometric characteristic at the client in a key-dependent manner, the key-dependent biometric data samples may be transmitted from the client to the server without the need for additional encryption and/or a signature.
- a key is preferably transmitted from the server to the client.
- the key is then used to perform the key-dependent sampling of the biometric characteristic at the client.
- the key-dependent sampling may be performed by sampling the biometric characteristic at a sampling frequency that is a function of the key.
- the key can be applied to the sampled biometric data, to thereby generate the key-dependent biometric data samples that are a function of the key.
- the key is used to perform nonlinear key-dependent sampling of the biometric characteristic at the client, for example by using the key to determine the sampling frequency and also using the key to apply a nonlinear function to the sampled biometric data.
- Nonlinear function may be a one-way function such as a hash function. Further encryption of the biometric data and/or the use of a signature with the biometric data need not be performed.
- the key is also applied to at least one template, to thereby obtain key-dependent biometric data template samples.
- a comparison is then made between the key-dependent biometric data and the at least one key-dependent biometric data template samples at the server, in order to identify and/or verify the biometric characteristic.
- the key may be transmitted from the server to the client in an unsecured manner (in the clear).
- a new key is preferably transmitted prior to each biometric characteristic sampling.
- the key may be encrypted.
- the key may include more than one value that is used to perform key-dependent sampling of biometric characteristics. For example, if the nonlinear sampling function is a cosine function, the frequency and phase of the cosine function may be transmitted as the key, to govern the sampling rate and the function that is applied to the sampled biometric data.
- the key may be a random value that is transmitted from the server to the client in the clear. The random value may then be used in combination with the secret value, to perform key-dependent sampling.
- biometric data may be securely transmitted from a client to a server without requiring complex encryption and/or signatures. Secure electronic commerce may thereby be provided in an efficient manner. It will be understood that the present invention may take the form of systems, methods and/or computer program products.
- FIG. 1 is a block diagram of conventional Internet-based client server biometric systems, methods and computer program products.
- FIG. 2 is a block diagram of Internet-based client server biometric systems, methods and computer program products according to the present invention.
- FIG. 3 is a flowchart illustrating biometric data transmission according to the present invention.
- FIG. 4 is a flowchart illustrating biometric data processing according to the present invention.
- FIG. 5 graphically illustrates a conventional biometric characteristic.
- FIGS. 6 and 7 graphically illustrate generation of key-dependent biometric data according to the present invention.
- the present invention may be embodied as systems (apparatus), methods and/or computer program products. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product on a computer-readable storage medium having computer-readable program code means embodied in the medium. Any suitable computer readable medium may be utilized including hard disks, CD-ROMs, optical storage devices, or magnetic storage devices.
- FIG. 2 illustrates an electronic commerce system method and computer program product using the Internet 114 to transmit biometric data from the client 110 to the server 112 using a web browser 116 at the client 110 and a web server 118 at the server 112 .
- the client 110 includes a client biometric plug-in 122 including biometric data acquisition 132 that performs key-dependent sampling of a biometric characteristic at the client, to thereby generate key-dependent biometric data samples.
- the key-dependent samples may be transmitted to the server 112 over the Internet 114 without the need of additional encryption using an encryption algorithm such as the DES algorithm and without the need for a signature using a public-key algorithm such as the RSA algorithm.
- a server biometric script 124 obtains the key-dependent samples from the web server 118 .
- Key-dependent sampling of at least one template T 1 -Tn is performed to obtain at least one key-dependent template T 1 (k)-Tn(k) at Blocks 140 and 148 respectively.
- a template compare module 142 compares the at least one key-dependent template T 1 (k)-Tn(k) with the key-dependent samples that are obtained from the web server 118 , in order to verify and/or identify the biometric data.
- the server biometric script can include and/or invoke one or more application programs to obtain templates (Block) 140 , generate key-dependent templates (Block 148 ) and perform a comparison (Block 142 ).
- the application program(s) can interface an Application Program Interface (API) that provides hardware and/or software cryptographic services.
- API Application Program Interface
- a key is first transmitted from the server 112 to the client 110 .
- the key can be a single random number, a plurality of random numbers or other combinations of values, that can be used to set the sampling frequency and/or other sampling parameters in a nonlinear function that is used to perform nonlinear key-dependent sampling of the biometric characteristic at the client.
- the biometric characteristic is sampled at a key-dependent sample frequency. For example, a biometric characteristic, which is shown in FIG. 5 as a function of time and/or space, is sampled at a sample frequency T in FIG.
- the key T may be transmitted from the server 112 to the client 110 , to thereby provide a sampling frequency T at which the biometric characteristic is sampled.
- the actual values of the key-dependent biometric data samples are shown by dots in FIG. 6 .
- the key itself may also be applied to the sampled biometric characteristic so that the actual values that are obtained differ from the actual values of the key-dependent biometric data by a nonlinear function.
- the key is applied to the sampled biometric data of FIG. 6, to thereby generate key-dependent biometric data samples, shown in dots in FIG. 7 .
- the key-dependent biometric data samples are preferably nonlinearly related to the actual biometric data samples of FIG. 6 . They may also be a one-way nonlinear function of the biometric data samples, such as a hash function.
- the key-dependent samples are transmitted to the server 112 .
- biometric data processing takes place as shown in FIG. 4 .
- one or more of the templates T 1 -Tn are sampled at the key-dependent sample frequency, and at Block 420 , the key is applied to the sample template(s), to thereby generate the key-dependent template(s) T 1 (k)-Tn(k) of FIG. 2 .
- the key-dependent template(s) 148 are compared to the key-dependent samples that are obtained from the web server 118 , to thereby verify and/or identify the biometric data.
- the biometric characteristic of FIG. 5 is a continuous input speech signal ⁇ (T), where T is time.
- a sensing device in the biometric data acquisition module 132 converts the input speech signal into a binary code representing a quantized amplitude value closest to the amplitude of the signal every T seconds, where T is the sampling period.
- the sampling operation is made a nonlinear function of the sampling frequency, so that the sampling frequency can be used as the key for the operation.
- a cosine function may be used to obtain key-dependent samples of the biometric characteristic as follows:
- c(n) is the key dependent sample at point n
- ⁇ (n.T) is the sampled signal at point n
- the key-dependent samples c(n) depend on the key frequencies F and F 0 in a nonlinear way.
- the key-dependent samples are transmitted form the client 110 over the Internet 114 using the browser 116 , and are received at the server 112 by the web server 118 .
- the key frequencies F and F 0 are used to produce at least one key-dependent template T 1 (k)-Tn(k) from at least one of the prestored templates T 1 -Tn by key-dependent sampling of the template data, as was described above.
- a key-dependent template and the key-dependent samples are compared to determine if both are from the same user. Identification can be performed in a similar manner, but in this case the key may be used to produce many key-dependent templates from the prestored templates. Then, the key-dependent samples are compared to the key-dependent templates, to determine the identity of the user.
- the key prior to performing the biometric sampling operation, the key should be installed or initialized at both the client and server systems 110 and 112 respectively. If cryptography is already present at the client and server for other reasons, then the server can use public-key or symmetric-key cryptography to send the key (for example F and F 0 ) to the server, and thereby provide enhanced security to the key. Alternatively, the key may be transmitted in the clear from the server 112 to the client 110 . Clear transmission of the key may still allow secure transmission of biometric data if the key space is large enough to provide that an attacker will be unable to intercept enough transmitted biometric data and keys to forge a biometric sample for a new intercepted key.
- biometric sample is rich in information content, and it contains a large amount of data, then key-dependent sampling need not interfere with the robustness of the user identification or user verification, in which the key-dependent samples and the key-dependent templates are compared or analyzed to determine whether they are biometric data from the same user.
- the amount of information content and biometric samples continue to increase, it may be more feasible to transmit the key in the clear from the server 112 to the client 110 .
- the key is not transmitted in the clear. Rather, the client 110 and the server 112 share a secret value S.
- the server 112 sends a random value R to the client 110 in the clear.
- the random value is used in combination with the secret value, to perform key-dependent sampling.
- the derived key can be the key frequencies F and F 0 . This can be achieved, for example by using a hash function, such as the conventional SHA-1, over the concatenated S and R values as follows:
- the common secret value S is first initialized in each device.
- this technique may have advantages because the keys are not transmitted in the clear, so that an attacker may not have a clue about the key value produced from S and R, assuming that R is large enough so that it is unlikely to repeat.
- the attacker generally will not know which key-dependent biometric sample to substitute for his own key-dependent biometric sample in order to impersonate another user.
- the key derivation algorithm may be simple and straightforward. Thus, while the client and server may need to implement the key derivation algorithm, they need not implement an encryption algorithm.
- Identification/verification may assume that each key-dependent biometric sample and each associated key-dependent template are uniquely paired together and that a key-dependent biometric sample obtained for a first key will not succeed in being validated against a key-dependent template for a different second key.
- the key-dependent sample should be constructed so that the obtained biometric samples are different for each key, i.e., different enough so that stated granularity in the identification/validation procedure may be achieved.
- a key-dependent biometric sample obtained for a first key generally will not succeed in being validated against a key-dependent template for a different second key. This is because for at least one sample point i, c′(i) ⁇ c′′(i), i.e. the following inequality holds:
- picking the key frequencies at random may satisfy the above-described desire to obtain different biometric samples for each key with high probability.
- Another biometric system in which the present invention maybe used is a computer program product marketed by Miros Inc., Wellesley, Mass., called TrueFace, which can secure Internet website access. See www.miros.com.
- TrueFace uses Microsoft ActiveX technology to download facial capture software to the browser of a surfing computer user. The ActiveX component returns the captured data to the site where the TrueFace server component can verify the surfer against an enrolled image.
- the server software runs on Windows NT, whereas the client is Microsoft's Internet Explorer or Netscape Navigator using a plug-in.
- a possible attack against this biometric system may be for the attacker to first intercept a biometric sample during transmission (client to server) and then to impersonate that other user by performing an active line attack in which the attacker biometric data is replaced by the intercepted biometric data.
- the biometric data can be protected through the use of key-dependent sampling according to the invention.
- the server would generate a key and communicate it to the browser, for example along with the facial capture software downloaded from the server.
- the facial capture software in turn would use the key to perform a key-dependent sampling operation to obtain a corresponding key-dependent biometric facial sample, which would then be sent in the clear to the server.
- the server would use the key to filter a stored biometric template to produce key-dependent biometric template samples, which would then be compared or analyzed against the key-dependent biometric facial sample received from the client to determine whether both pieces of biometric data came from the same user. If the number of keys and key-dependent biometric facial samples is large enough, then an attacker should not be able to forge key-dependent biometric facial data for a key that it had not already seen (or intercepted).
- a smart card manufacturer On Track Innovations has integrated finger biometrics to its “Eyecom” contactless smart card using Identix's “Fingerscan” technology. See www.oti.co.il.
- the exchange of data between the card and the read terminal takes place “on the fly” with only a short contactless power window to exchange the biometric template.
- the 1.2K byte template is encrypted for wireless transmission to the Fingerscan reader for verification, using either DES or RSA public key encryption. The verification process is private and localized, without the use of any network.
- the present invention may be applied as follows:
- the Fingerscan reader may generate a key which may then be communicated in the clear to the smart card.
- the smart card would use the key to filter the stored biometric template to produce a unique key-dependent biometric template, which it then transmits to the Fingerscan reader.
- the Fingerscan reader in turn would use the key to perform a key-dependent sampling operation using the Fingerscan technology to obtain a corresponding key-dependent biometric sample, which would then be compared and analyzed against the key-dependent biometric template received from the smart card.
- An interloper who intercepts a key and key-dependent biometric template, or several such key and key-dependent biometric templates, may not have enough information to forge biometric data since the key selected by the Fingerscan technology would not necessarily match one of the keys intercepted by the interloper.
- the interloper would not have the necessary biometric information to forge the biometric data. It will be understood that the security may depend on having a key-space large enough to provide that the interloper will not be able to collect enough of the biometric template to forge biometric data for an arbitrary key selected by the Fingerscan technology.
- biometric sensing systems, methods and computer program products may thereby be provided.
- blocks of the figures support combinations of means for performing the specified functions, combinations of steps for performing the specified functions and program instruction means for performing the specified functions. It will also be understood that individual blocks of the figures, and combinations of blocks in the flowchart illustrations, can be implemented by special purpose hardware-based computer systems which perform the specified functions or steps, or by combinations of special purpose hardware and computer instructions.
Abstract
Description
Claims (45)
Priority Applications (16)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US09/238,700 US6507912B1 (en) | 1999-01-27 | 1999-01-27 | Protection of biometric data via key-dependent sampling |
TW088120472A TW511362B (en) | 1999-01-27 | 1999-11-23 | Protection of biometric data via key-dependent sampling |
HU0105304A HUP0105304A2 (en) | 1999-01-27 | 2000-01-26 | Protection of biometric data via key-dependent sampling |
ES00901220T ES2254131T3 (en) | 1999-01-27 | 2000-01-26 | PROTECTION OF BIOMETRIC DATA VIA KEY DEPENDENT SAMPLING. |
EP00901220A EP1145484B1 (en) | 1999-01-27 | 2000-01-26 | Protection of biometric data via key-dependent sampling |
PL00364730A PL364730A1 (en) | 1999-01-27 | 2000-01-26 | Protection of biometric data via key-dependent sampling |
CZ20012673A CZ300144B6 (en) | 1999-01-27 | 2000-01-26 | Protection of biometric data by employing key-dependent sampling Key-dependent sampling of a biometric characteristic is performed at a client (110), to thereby generate key-dependent biometric data samples. The key-dependent biometric data samples a |
PCT/GB2000/000221 WO2000045551A1 (en) | 1999-01-27 | 2000-01-26 | Protection of biometric data via key-dependent sampling |
IL14419600A IL144196A0 (en) | 1999-01-27 | 2000-01-26 | Protection of biometric data via key-dependent sampling |
IL14385500A IL143855A0 (en) | 1999-01-27 | 2000-01-26 | Protection of biometric data via key-dependent sampling |
JP2000596697A JP4106188B2 (en) | 1999-01-27 | 2000-01-26 | Client system for secure transmission of biometric data |
AU21180/00A AU2118000A (en) | 1999-01-27 | 2000-01-26 | Protection of biometric data via key-dependent sampling |
AT00901220T ATE315293T1 (en) | 1999-01-27 | 2000-01-26 | PROTECTING BIOMETRIC DATA USING KEY-DEPENDENT SENSING |
CNB008031479A CN100414867C (en) | 1999-01-27 | 2000-01-26 | Protection of biometric data via key-dependent sampling |
DE60025326T DE60025326T2 (en) | 1999-01-27 | 2000-01-26 | PROTECTION OF BIOMETRIC DATA BY KEY INDEPENDENT SCAN |
IL143855A IL143855A (en) | 1999-01-27 | 2001-06-19 | Protection of biometric data via key-dependent sampling |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US09/238,700 US6507912B1 (en) | 1999-01-27 | 1999-01-27 | Protection of biometric data via key-dependent sampling |
Publications (1)
Publication Number | Publication Date |
---|---|
US6507912B1 true US6507912B1 (en) | 2003-01-14 |
Family
ID=22898966
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US09/238,700 Expired - Lifetime US6507912B1 (en) | 1999-01-27 | 1999-01-27 | Protection of biometric data via key-dependent sampling |
Country Status (14)
Country | Link |
---|---|
US (1) | US6507912B1 (en) |
EP (1) | EP1145484B1 (en) |
JP (1) | JP4106188B2 (en) |
CN (1) | CN100414867C (en) |
AT (1) | ATE315293T1 (en) |
AU (1) | AU2118000A (en) |
CZ (1) | CZ300144B6 (en) |
DE (1) | DE60025326T2 (en) |
ES (1) | ES2254131T3 (en) |
HU (1) | HUP0105304A2 (en) |
IL (3) | IL143855A0 (en) |
PL (1) | PL364730A1 (en) |
TW (1) | TW511362B (en) |
WO (1) | WO2000045551A1 (en) |
Cited By (86)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020070844A1 (en) * | 1999-12-14 | 2002-06-13 | Davida George I. | Perfectly secure authorization and passive identification with an error tolerant biometric system |
US20020073213A1 (en) * | 2000-10-13 | 2002-06-13 | Tsuyoshi Mekata | Apparatus for outputting individual authentication information |
US20020077978A1 (en) * | 2000-06-22 | 2002-06-20 | The Chase Manhattan Bank | Method and system for processing internet payments |
US20020118864A1 (en) * | 2001-02-28 | 2002-08-29 | Kenji Kondo | Personal authentication method and device |
US20030012415A1 (en) * | 2001-07-10 | 2003-01-16 | Cossel Travis M. | Method and apparatus to biometrically authenticate MFP users |
US20030061172A1 (en) * | 2001-09-21 | 2003-03-27 | Timothy Robinson | System and method for biometric authorization for financial transactions |
US20030101131A1 (en) * | 2001-11-01 | 2003-05-29 | Warren Mary Carter | System and method for establishing or modifying an account with user selectable terms |
US20030101116A1 (en) * | 2000-06-12 | 2003-05-29 | Rosko Robert J. | System and method for providing customers with seamless entry to a remote server |
US20030105981A1 (en) * | 2001-12-04 | 2003-06-05 | Miller Lawrence R. | System and method for single session sign-on |
US20030177102A1 (en) * | 2001-09-21 | 2003-09-18 | Timothy Robinson | System and method for biometric authorization for age verification |
US20030217276A1 (en) * | 2002-05-15 | 2003-11-20 | Lacous Mira Kristina | Match template protection within biometric security systems |
US20030223624A1 (en) * | 2002-05-30 | 2003-12-04 | Laurence Hamid | Method and apparatus for hashing data |
US20030226041A1 (en) * | 2002-03-28 | 2003-12-04 | Innovation Connection Corporation | Apparatus and method for effecting secure physical and commercial transactions in a contactless manner using biometric identity validation |
US20030225711A1 (en) * | 2002-02-20 | 2003-12-04 | Martin Paping | Method and apparatus for postal user identification and billing |
US20040059924A1 (en) * | 2002-07-03 | 2004-03-25 | Aurora Wireless Technologies, Ltd. | Biometric private key infrastructure |
US20040059950A1 (en) * | 2002-09-24 | 2004-03-25 | Bender Steven S. | Key sequence rhythm recognition system and method |
US20040088219A1 (en) * | 2002-11-05 | 2004-05-06 | First Usa Bank, N.A. | System and method for providing incentives to consumers to share information |
US20040133787A1 (en) * | 2002-03-28 | 2004-07-08 | Innovation Connection Corporation | System, method and apparatus for enabling transactions using a biometrically enabled programmable magnetic stripe |
US20040153421A1 (en) * | 2001-09-21 | 2004-08-05 | Timothy Robinson | System and method for biometric authorization of age-restricted transactions conducted at an unattended device |
US20040153418A1 (en) * | 2003-02-05 | 2004-08-05 | Hanweck Gerald Alfred | System and method for providing access to data from proprietary tools |
US20040193893A1 (en) * | 2001-05-18 | 2004-09-30 | Michael Braithwaite | Application-specific biometric templates |
US20050001711A1 (en) * | 2000-11-06 | 2005-01-06 | Innovation Connection Corporation | System, method and apparatus for electronic ticketing |
US20050001712A1 (en) * | 2003-07-03 | 2005-01-06 | Yarbrough Craig D. | RF ID tag |
US20050029349A1 (en) * | 2001-04-26 | 2005-02-10 | Mcgregor Christopher M. | Bio-metric smart card, bio-metric smart card reader, and method of use |
US20050055555A1 (en) * | 2003-09-05 | 2005-03-10 | Rao Srinivasan N. | Single sign-on authentication system |
US6981016B1 (en) * | 1999-06-11 | 2005-12-27 | Visage Development Limited | Distributed client/server computer network |
US20060083372A1 (en) * | 2004-10-15 | 2006-04-20 | Industrial Technology Research Institute | Biometrics-based cryptographic key generation system and method |
US20060095789A1 (en) * | 2004-11-03 | 2006-05-04 | International Business Machines Corporation | Method and system for establishing a biometrically enabled password |
US20060106703A1 (en) * | 2000-11-02 | 2006-05-18 | First Usa Bank, Na | System and method for aggregate portfolio client support |
US20060149686A1 (en) * | 2000-11-30 | 2006-07-06 | Allison Debonnett | Method of payment and settlement of goods and services via the INTERNET |
US20060190723A1 (en) * | 2005-02-18 | 2006-08-24 | Jp Morgan Chase Bank | Payload layer security for file transfer |
US20060259439A1 (en) * | 2001-09-21 | 2006-11-16 | Mann William F Iii | System for providing cardless payment |
US20060285736A1 (en) * | 1992-11-17 | 2006-12-21 | Health Hero Network, Inc. | Multi-user remote health monitoring system with biometrics support |
US20060293891A1 (en) * | 2005-06-22 | 2006-12-28 | Jan Pathuel | Biometric control systems and associated methods of use |
US20070192618A1 (en) * | 1999-07-02 | 2007-08-16 | Kimberly Ellmore | System and method for single sign on process for websites with multiple applications and services |
US20070260706A1 (en) * | 2001-09-19 | 2007-11-08 | Jpmorgan Chase Bank | System and method for portal infrastructure tracking |
US20070283171A1 (en) * | 2002-09-17 | 2007-12-06 | Jpmorgan Chase Bank, N.A. | System and method for managing data privacy |
US20070288364A1 (en) * | 1999-11-04 | 2007-12-13 | Gendler Joesph | System and method for automatic financial project management |
US20080016180A1 (en) * | 2001-07-12 | 2008-01-17 | Jpmorganchase Bank, N.A. | System And Method For Providing Discriminated Content to Network Users |
US20080027861A1 (en) * | 1999-11-04 | 2008-01-31 | Gendler Joseph | System and method for automatic financial project management |
US20080034218A1 (en) * | 2002-09-24 | 2008-02-07 | Bender Steven L | Key sequence rhythm guidance recognition system and method |
US20080123300A1 (en) * | 2006-11-29 | 2008-05-29 | International Business Machines Corporation | Folded-sheet-metal heatsinks for closely packaged heat-producing devices |
US7409543B1 (en) | 2000-03-30 | 2008-08-05 | Digitalpersona, Inc. | Method and apparatus for using a third party authentication server |
US20080316712A1 (en) * | 2004-04-09 | 2008-12-25 | Pauley Robert S | High density module having at least two substrates and at least one thermally conductive layer therebetween |
US7474769B1 (en) * | 2004-09-14 | 2009-01-06 | Unisys Corporation | Bioindex mechanism for increasing the relative speed of biometric identification against large population samples |
US20090070270A1 (en) * | 2001-09-21 | 2009-03-12 | Yt Acquisition Corporation | System and method for purchase benefits at a point of sale |
US7619893B1 (en) | 2006-02-17 | 2009-11-17 | Netlist, Inc. | Heat spreader for electronic modules |
US7698565B1 (en) * | 2000-03-30 | 2010-04-13 | Digitalpersona, Inc. | Crypto-proxy server and method of using the same |
US7711152B1 (en) | 1999-04-30 | 2010-05-04 | Davida George I | System and method for authenticated and privacy preserving biometric identification systems |
US20100172495A1 (en) * | 1999-12-10 | 2010-07-08 | International Business Machines Corporation | Semiotic system and method with privacy protection |
US7756816B2 (en) | 2002-10-02 | 2010-07-13 | Jpmorgan Chase Bank, N.A. | System and method for network-based project management |
US7765164B1 (en) | 2001-09-21 | 2010-07-27 | Yt Acquisition Corporation | System and method for offering in-lane periodical subscriptions |
US7778933B2 (en) | 2001-09-21 | 2010-08-17 | Yt Acquisition Corporation | System and method for categorizing transactions |
US7811097B1 (en) | 2005-08-29 | 2010-10-12 | Netlist, Inc. | Circuit with flexible portion |
US20110019871A1 (en) * | 2008-11-21 | 2011-01-27 | Robert Bosch Gmbh | Device for creating and/or processing an object signature, monitoring device, method and computer program |
US7899753B1 (en) | 2002-03-25 | 2011-03-01 | Jpmorgan Chase Bank, N.A | Systems and methods for time variable financial authentication |
US8018723B1 (en) | 2008-04-30 | 2011-09-13 | Netlist, Inc. | Heat dissipation for electronic modules |
US20110246768A1 (en) * | 2010-04-06 | 2011-10-06 | King Saud University | Systems and methods improving cryptosystems with biometrics |
US8082575B2 (en) | 2002-03-28 | 2011-12-20 | Rampart-Id Systems, Inc. | System, method and apparatus for enabling transactions using a user enabled programmable magnetic stripe |
US8160960B1 (en) | 2001-06-07 | 2012-04-17 | Jpmorgan Chase Bank, N.A. | System and method for rapid updating of credit information |
US8200980B1 (en) | 2001-09-21 | 2012-06-12 | Open Invention Network, Llc | System and method for enrolling in a biometric system |
US8321682B1 (en) | 2008-01-24 | 2012-11-27 | Jpmorgan Chase Bank, N.A. | System and method for generating and managing administrator passwords |
US8325994B2 (en) | 1999-04-30 | 2012-12-04 | Davida George I | System and method for authenticated and privacy preserving biometric identification systems |
US8473735B1 (en) | 2007-05-17 | 2013-06-25 | Jpmorgan Chase | Systems and methods for managing digital certificates |
US8571975B1 (en) | 1999-11-24 | 2013-10-29 | Jpmorgan Chase Bank, N.A. | System and method for sending money via E-mail over the internet |
US8583926B1 (en) | 2005-09-19 | 2013-11-12 | Jpmorgan Chase Bank, N.A. | System and method for anti-phishing authentication |
US8793490B1 (en) | 2006-07-14 | 2014-07-29 | Jpmorgan Chase Bank, N.A. | Systems and methods for multifactor authentication |
US8849716B1 (en) | 2001-04-20 | 2014-09-30 | Jpmorgan Chase Bank, N.A. | System and method for preventing identity theft or misuse by restricting access |
US8868036B1 (en) * | 2007-06-27 | 2014-10-21 | ENORCOM Corporation | Security for mobile system |
CN104346161A (en) * | 2013-08-09 | 2015-02-11 | 联想(北京)有限公司 | Information processing method and electronic equipment |
US9060003B2 (en) | 2006-10-17 | 2015-06-16 | A10 Networks, Inc. | System and method to associate a private user identity with a public user identity |
US9189788B1 (en) | 2001-09-21 | 2015-11-17 | Open Invention Network, Llc | System and method for verifying identity |
US9201885B1 (en) | 2007-06-27 | 2015-12-01 | ENORCOM Corporation | Multi-platform storage and user interface environment |
US9344421B1 (en) | 2006-05-16 | 2016-05-17 | A10 Networks, Inc. | User access authentication based on network access point |
US9398011B2 (en) | 2013-06-24 | 2016-07-19 | A10 Networks, Inc. | Location determination for user authentication |
US9419957B1 (en) | 2013-03-15 | 2016-08-16 | Jpmorgan Chase Bank, N.A. | Confidence-based authentication |
US20160255055A1 (en) * | 2015-01-29 | 2016-09-01 | Google Inc. | Controlling Access To Resource Functions At A Control Point Of The Resource Via A User Device |
US9497201B2 (en) | 2006-10-17 | 2016-11-15 | A10 Networks, Inc. | Applying security policy to an application session |
US9600443B2 (en) | 2012-01-30 | 2017-03-21 | International Business Machines Corporation | Tracking entities by means of hash values |
US9608826B2 (en) | 2009-06-29 | 2017-03-28 | Jpmorgan Chase Bank, N.A. | System and method for partner key management |
EP3078003A4 (en) * | 2013-12-02 | 2017-08-02 | Identity Authentication Management | Methods and systems for multi-key veritable biometric identity authentication |
US10148726B1 (en) | 2014-01-24 | 2018-12-04 | Jpmorgan Chase Bank, N.A. | Initiating operating system commands based on browser cookies |
US20200042684A1 (en) * | 2017-03-13 | 2020-02-06 | Fingerprint Cards Ab | Updating biometric data templates |
US10726417B1 (en) | 2002-03-25 | 2020-07-28 | Jpmorgan Chase Bank, N.A. | Systems and methods for multifactor authentication |
US10789593B2 (en) | 2017-07-31 | 2020-09-29 | Alibaba Group Holding Limited | Biometric feature database establishing method and apparatus |
US11165770B1 (en) | 2013-12-06 | 2021-11-02 | A10 Networks, Inc. | Biometric verification of a human internet user |
Families Citing this family (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6778688B2 (en) * | 2001-05-04 | 2004-08-17 | International Business Machines Corporation | Remote authentication of fingerprints over an insecure network |
FR2829855A1 (en) * | 2001-09-14 | 2003-03-21 | St Microelectronics Sa | SECURE IDENTIFICATION BY BIOMETRIC DATA |
AU2003247117B2 (en) * | 2002-04-30 | 2010-01-21 | Robert Eryou | System and apparatus for authenticating to a system or network |
EP1418483A1 (en) * | 2002-08-23 | 2004-05-12 | Siemens Aktiengesellschaft | Examination and grant of use authorizations |
WO2007036822A1 (en) * | 2005-09-29 | 2007-04-05 | Koninklijke Philips Electronics N.V. | Secure protection of biometric templates |
JP2010510744A (en) * | 2006-11-21 | 2010-04-02 | コーニンクレッカ フィリップス エレクトロニクス エヌ ヴィ | Biometric fuzzy signature |
CN107438000B (en) * | 2016-05-26 | 2020-08-07 | 青岛博文广成信息安全技术有限公司 | CF L Huyi authentication method |
US20220086142A1 (en) * | 2018-08-16 | 2022-03-17 | Cyberark Software Ltd. | Detecting and preventing unauthorized credential change |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0008086A1 (en) | 1978-08-04 | 1980-02-20 | Siemens Aktiengesellschaft | Device for realizing a scrambled transmission of information |
US5325318A (en) * | 1992-01-31 | 1994-06-28 | Constream Corporation | Variable rate digital filter |
WO1997025800A1 (en) | 1996-01-08 | 1997-07-17 | Mytec Technologies Inc. | Method for secure data transmission between remote stations |
WO1998012670A1 (en) | 1996-09-18 | 1998-03-26 | Dew Engineering And Development Limited | Biometric identification system for providing secure access |
US6076167A (en) * | 1996-12-04 | 2000-06-13 | Dew Engineering And Development Limited | Method and system for improving security in network applications |
US6167517A (en) * | 1998-04-09 | 2000-12-26 | Oracle Corporation | Trusted biometric client authentication |
US6202151B1 (en) * | 1997-05-09 | 2001-03-13 | Gte Service Corporation | System and method for authenticating electronic transactions using biometric certificates |
US6278746B1 (en) * | 1998-05-12 | 2001-08-21 | Montreal Networks Limited | Timing recovery loop circuit in a receiver of a modem |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CA2287857C (en) * | 1997-05-09 | 2008-07-29 | Gte Cybertrust Solutions Incorporated | Biometric certificates |
-
1999
- 1999-01-27 US US09/238,700 patent/US6507912B1/en not_active Expired - Lifetime
- 1999-11-23 TW TW088120472A patent/TW511362B/en not_active IP Right Cessation
-
2000
- 2000-01-26 ES ES00901220T patent/ES2254131T3/en not_active Expired - Lifetime
- 2000-01-26 EP EP00901220A patent/EP1145484B1/en not_active Expired - Lifetime
- 2000-01-26 AT AT00901220T patent/ATE315293T1/en not_active IP Right Cessation
- 2000-01-26 WO PCT/GB2000/000221 patent/WO2000045551A1/en active IP Right Grant
- 2000-01-26 PL PL00364730A patent/PL364730A1/en not_active Application Discontinuation
- 2000-01-26 CN CNB008031479A patent/CN100414867C/en not_active Expired - Lifetime
- 2000-01-26 IL IL14385500A patent/IL143855A0/en active IP Right Grant
- 2000-01-26 AU AU21180/00A patent/AU2118000A/en not_active Abandoned
- 2000-01-26 IL IL14419600A patent/IL144196A0/en unknown
- 2000-01-26 CZ CZ20012673A patent/CZ300144B6/en not_active IP Right Cessation
- 2000-01-26 JP JP2000596697A patent/JP4106188B2/en not_active Expired - Lifetime
- 2000-01-26 DE DE60025326T patent/DE60025326T2/en not_active Expired - Lifetime
- 2000-01-26 HU HU0105304A patent/HUP0105304A2/en unknown
-
2001
- 2001-06-19 IL IL143855A patent/IL143855A/en not_active IP Right Cessation
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0008086A1 (en) | 1978-08-04 | 1980-02-20 | Siemens Aktiengesellschaft | Device for realizing a scrambled transmission of information |
US5325318A (en) * | 1992-01-31 | 1994-06-28 | Constream Corporation | Variable rate digital filter |
WO1997025800A1 (en) | 1996-01-08 | 1997-07-17 | Mytec Technologies Inc. | Method for secure data transmission between remote stations |
WO1998012670A1 (en) | 1996-09-18 | 1998-03-26 | Dew Engineering And Development Limited | Biometric identification system for providing secure access |
US6076167A (en) * | 1996-12-04 | 2000-06-13 | Dew Engineering And Development Limited | Method and system for improving security in network applications |
US6202151B1 (en) * | 1997-05-09 | 2001-03-13 | Gte Service Corporation | System and method for authenticating electronic transactions using biometric certificates |
US6167517A (en) * | 1998-04-09 | 2000-12-26 | Oracle Corporation | Trusted biometric client authentication |
US6278746B1 (en) * | 1998-05-12 | 2001-08-21 | Montreal Networks Limited | Timing recovery loop circuit in a receiver of a modem |
Non-Patent Citations (6)
Title |
---|
"OTI: On Track Innovations Ltd.", http://www.oti.co.il/print.html, 1999, 11 pp. |
"Welcome to the True Face of Security", Miros, Inc., http://www.miros.com, 1999, 3 pp. |
Brown et al., "Biometric Encryption: Information Privacy in a Networked World", EDI Forum: The Journal of Electronic Commerce, vol. 10, No. 3, 1997, pp. 37-43. |
Davida et al., "On Enabling Secure Applications Through Off-line Biometric Identification", IEEE, 1998, pp. 148-157. |
George et al., "A Robust Speaker Verification Biometric", IEEE, 1995, pp. 41-46. |
Kim, "Biometerics, It is a Viable Proposition for Indentity Authentication and access Control", Computers & Security, vol. 14, 1995, pp. 205-214. |
Cited By (172)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060285736A1 (en) * | 1992-11-17 | 2006-12-21 | Health Hero Network, Inc. | Multi-user remote health monitoring system with biometrics support |
US7711152B1 (en) | 1999-04-30 | 2010-05-04 | Davida George I | System and method for authenticated and privacy preserving biometric identification systems |
US20100194530A1 (en) * | 1999-04-30 | 2010-08-05 | Davida George I | System and method for authenticated and privacy preserving biometric identification systems |
US7961915B2 (en) | 1999-04-30 | 2011-06-14 | Davida George I | System and method for authenticated and privacy preserving biometric identification systems |
US8325994B2 (en) | 1999-04-30 | 2012-12-04 | Davida George I | System and method for authenticated and privacy preserving biometric identification systems |
US6981016B1 (en) * | 1999-06-11 | 2005-12-27 | Visage Development Limited | Distributed client/server computer network |
US8590008B1 (en) | 1999-07-02 | 2013-11-19 | Jpmorgan Chase Bank, N.A. | System and method for single sign on process for websites with multiple applications and services |
US7966496B2 (en) | 1999-07-02 | 2011-06-21 | Jpmorgan Chase Bank, N.A. | System and method for single sign on process for websites with multiple applications and services |
US20070192618A1 (en) * | 1999-07-02 | 2007-08-16 | Kimberly Ellmore | System and method for single sign on process for websites with multiple applications and services |
US7685013B2 (en) | 1999-11-04 | 2010-03-23 | Jpmorgan Chase Bank | System and method for automatic financial project management |
US20080027861A1 (en) * | 1999-11-04 | 2008-01-31 | Gendler Joseph | System and method for automatic financial project management |
US20070288364A1 (en) * | 1999-11-04 | 2007-12-13 | Gendler Joesph | System and method for automatic financial project management |
US8571975B1 (en) | 1999-11-24 | 2013-10-29 | Jpmorgan Chase Bank, N.A. | System and method for sending money via E-mail over the internet |
US8200982B2 (en) | 1999-12-10 | 2012-06-12 | International Business Machines Corporation | Semiotic system and method with privacy protection |
US20100172495A1 (en) * | 1999-12-10 | 2010-07-08 | International Business Machines Corporation | Semiotic system and method with privacy protection |
US7761715B1 (en) * | 1999-12-10 | 2010-07-20 | International Business Machines Corporation | Semiotic system and method with privacy protection |
US7269277B2 (en) * | 1999-12-14 | 2007-09-11 | Davida George I | Perfectly secure authorization and passive identification with an error tolerant biometric system |
US20020070844A1 (en) * | 1999-12-14 | 2002-06-13 | Davida George I. | Perfectly secure authorization and passive identification with an error tolerant biometric system |
US7409543B1 (en) | 2000-03-30 | 2008-08-05 | Digitalpersona, Inc. | Method and apparatus for using a third party authentication server |
US7698565B1 (en) * | 2000-03-30 | 2010-04-13 | Digitalpersona, Inc. | Crypto-proxy server and method of using the same |
US7895432B2 (en) | 2000-03-30 | 2011-02-22 | Digitalpersona, Inc. | Method and apparatus for using a third party authentication server |
US20090031125A1 (en) * | 2000-03-30 | 2009-01-29 | Bjorn Vance C | Method and Apparatus for Using a Third Party Authentication Server |
US8458070B2 (en) | 2000-06-12 | 2013-06-04 | Jpmorgan Chase Bank, N.A. | System and method for providing customers with seamless entry to a remote server |
US20030101116A1 (en) * | 2000-06-12 | 2003-05-29 | Rosko Robert J. | System and method for providing customers with seamless entry to a remote server |
US8438086B2 (en) | 2000-06-12 | 2013-05-07 | Jpmorgan Chase Bank, N.A. | System and method for providing customers with seamless entry to a remote server |
US10185936B2 (en) | 2000-06-22 | 2019-01-22 | Jpmorgan Chase Bank, N.A. | Method and system for processing internet payments |
US20020077978A1 (en) * | 2000-06-22 | 2002-06-20 | The Chase Manhattan Bank | Method and system for processing internet payments |
US7254619B2 (en) * | 2000-10-13 | 2007-08-07 | Matsushita Electric Industrial Co., Ltd. | Apparatus for outputting individual authentication information connectable to a plurality of terminals through a network |
US20020073213A1 (en) * | 2000-10-13 | 2002-06-13 | Tsuyoshi Mekata | Apparatus for outputting individual authentication information |
US20060106703A1 (en) * | 2000-11-02 | 2006-05-18 | First Usa Bank, Na | System and method for aggregate portfolio client support |
US8103881B2 (en) | 2000-11-06 | 2012-01-24 | Innovation Connection Corporation | System, method and apparatus for electronic ticketing |
US20050001711A1 (en) * | 2000-11-06 | 2005-01-06 | Innovation Connection Corporation | System, method and apparatus for electronic ticketing |
US20060149686A1 (en) * | 2000-11-30 | 2006-07-06 | Allison Debonnett | Method of payment and settlement of goods and services via the INTERNET |
KR100784599B1 (en) * | 2001-02-28 | 2007-12-11 | 마츠시타 덴끼 산교 가부시키가이샤 | Personal authentication method and device |
US7099495B2 (en) * | 2001-02-28 | 2006-08-29 | Matsushita Electric Industrial Co., Ltd. | Frequency and resolution analyzed biometric authentication method and device |
US20020118864A1 (en) * | 2001-02-28 | 2002-08-29 | Kenji Kondo | Personal authentication method and device |
US10380374B2 (en) | 2001-04-20 | 2019-08-13 | Jpmorgan Chase Bank, N.A. | System and method for preventing identity theft or misuse by restricting access |
US8849716B1 (en) | 2001-04-20 | 2014-09-30 | Jpmorgan Chase Bank, N.A. | System and method for preventing identity theft or misuse by restricting access |
US20050029349A1 (en) * | 2001-04-26 | 2005-02-10 | Mcgregor Christopher M. | Bio-metric smart card, bio-metric smart card reader, and method of use |
US20060235729A1 (en) * | 2001-05-18 | 2006-10-19 | Michael Braithwaite | Application-specific biometric templates |
US20040193893A1 (en) * | 2001-05-18 | 2004-09-30 | Michael Braithwaite | Application-specific biometric templates |
US8160960B1 (en) | 2001-06-07 | 2012-04-17 | Jpmorgan Chase Bank, N.A. | System and method for rapid updating of credit information |
US20030012415A1 (en) * | 2001-07-10 | 2003-01-16 | Cossel Travis M. | Method and apparatus to biometrically authenticate MFP users |
US8185940B2 (en) | 2001-07-12 | 2012-05-22 | Jpmorgan Chase Bank, N.A. | System and method for providing discriminated content to network users |
US20080016180A1 (en) * | 2001-07-12 | 2008-01-17 | Jpmorganchase Bank, N.A. | System And Method For Providing Discriminated Content to Network Users |
US8335855B2 (en) | 2001-09-19 | 2012-12-18 | Jpmorgan Chase Bank, N.A. | System and method for portal infrastructure tracking |
US20070260706A1 (en) * | 2001-09-19 | 2007-11-08 | Jpmorgan Chase Bank | System and method for portal infrastructure tracking |
US8341421B1 (en) | 2001-09-21 | 2012-12-25 | Open Invention Network LLP | System and method for enrolling in a biometric system |
US20040153421A1 (en) * | 2001-09-21 | 2004-08-05 | Timothy Robinson | System and method for biometric authorization of age-restricted transactions conducted at an unattended device |
US20030177102A1 (en) * | 2001-09-21 | 2003-09-18 | Timothy Robinson | System and method for biometric authorization for age verification |
US20070276764A1 (en) * | 2001-09-21 | 2007-11-29 | Mann William F Iii | System for providing cardless payment |
US20030061172A1 (en) * | 2001-09-21 | 2003-03-27 | Timothy Robinson | System and method for biometric authorization for financial transactions |
US9646304B2 (en) | 2001-09-21 | 2017-05-09 | Jpmorgan Chase Bank, N.A. | System for providing cardless payment |
US9189788B1 (en) | 2001-09-21 | 2015-11-17 | Open Invention Network, Llc | System and method for verifying identity |
US20060259439A1 (en) * | 2001-09-21 | 2006-11-16 | Mann William F Iii | System for providing cardless payment |
US7269737B2 (en) * | 2001-09-21 | 2007-09-11 | Pay By Touch Checking Resources, Inc. | System and method for biometric authorization for financial transactions |
US7836485B2 (en) | 2001-09-21 | 2010-11-16 | Robinson Timothy L | System and method for enrolling in a biometric system |
US7778933B2 (en) | 2001-09-21 | 2010-08-17 | Yt Acquisition Corporation | System and method for categorizing transactions |
US8200980B1 (en) | 2001-09-21 | 2012-06-12 | Open Invention Network, Llc | System and method for enrolling in a biometric system |
US7769695B2 (en) | 2001-09-21 | 2010-08-03 | Yt Acquisition Corporation | System and method for purchase benefits at a point of sale |
US7765164B1 (en) | 2001-09-21 | 2010-07-27 | Yt Acquisition Corporation | System and method for offering in-lane periodical subscriptions |
US20060265602A1 (en) * | 2001-09-21 | 2006-11-23 | Robinson Timothy L | System and method for biometric authorization for financial transactions |
US20090070270A1 (en) * | 2001-09-21 | 2009-03-12 | Yt Acquisition Corporation | System and method for purchase benefits at a point of sale |
US20030101131A1 (en) * | 2001-11-01 | 2003-05-29 | Warren Mary Carter | System and method for establishing or modifying an account with user selectable terms |
US7689504B2 (en) | 2001-11-01 | 2010-03-30 | Jpmorgan Chase Bank, N.A. | System and method for establishing or modifying an account with user selectable terms |
US20030105981A1 (en) * | 2001-12-04 | 2003-06-05 | Miller Lawrence R. | System and method for single session sign-on |
US7987501B2 (en) | 2001-12-04 | 2011-07-26 | Jpmorgan Chase Bank, N.A. | System and method for single session sign-on |
US20030225711A1 (en) * | 2002-02-20 | 2003-12-04 | Martin Paping | Method and apparatus for postal user identification and billing |
US7899753B1 (en) | 2002-03-25 | 2011-03-01 | Jpmorgan Chase Bank, N.A | Systems and methods for time variable financial authentication |
US9240089B2 (en) | 2002-03-25 | 2016-01-19 | Jpmorgan Chase Bank, N.A. | Systems and methods for time variable financial authentication |
US10726417B1 (en) | 2002-03-25 | 2020-07-28 | Jpmorgan Chase Bank, N.A. | Systems and methods for multifactor authentication |
US8499334B2 (en) | 2002-03-28 | 2013-07-30 | Rampart-Id Systems, Inc. | System, method and apparatus for enabling transactions using a user enabled programmable magnetic stripe |
US7337326B2 (en) * | 2002-03-28 | 2008-02-26 | Innovation Connection Corporation | Apparatus and method for effecting secure physical and commercial transactions in a contactless manner using biometric identity validation |
US9016584B2 (en) | 2002-03-28 | 2015-04-28 | Innovation Connection Corporation | System, method and apparatus for enabling transactions using a biometrically enabled programmable magnetic stripe |
US8015592B2 (en) | 2002-03-28 | 2011-09-06 | Innovation Connection Corporation | System, method and apparatus for enabling transactions using a biometrically enabled programmable magnetic stripe |
US20030226041A1 (en) * | 2002-03-28 | 2003-12-04 | Innovation Connection Corporation | Apparatus and method for effecting secure physical and commercial transactions in a contactless manner using biometric identity validation |
US8082575B2 (en) | 2002-03-28 | 2011-12-20 | Rampart-Id Systems, Inc. | System, method and apparatus for enabling transactions using a user enabled programmable magnetic stripe |
US20040133787A1 (en) * | 2002-03-28 | 2004-07-08 | Innovation Connection Corporation | System, method and apparatus for enabling transactions using a biometrically enabled programmable magnetic stripe |
US7454624B2 (en) | 2002-05-15 | 2008-11-18 | Bio-Key International, Inc. | Match template protection within biometric security systems |
WO2003098863A1 (en) * | 2002-05-15 | 2003-11-27 | Bio-Key International, Inc. | Match template protection within biometric security systems |
US20030217276A1 (en) * | 2002-05-15 | 2003-11-20 | Lacous Mira Kristina | Match template protection within biometric security systems |
US7274804B2 (en) * | 2002-05-30 | 2007-09-25 | Activcard Ireland Limited | Method and apparatus for hashing data |
US20030223624A1 (en) * | 2002-05-30 | 2003-12-04 | Laurence Hamid | Method and apparatus for hashing data |
US20040059924A1 (en) * | 2002-07-03 | 2004-03-25 | Aurora Wireless Technologies, Ltd. | Biometric private key infrastructure |
US20070283171A1 (en) * | 2002-09-17 | 2007-12-06 | Jpmorgan Chase Bank, N.A. | System and method for managing data privacy |
US20040059950A1 (en) * | 2002-09-24 | 2004-03-25 | Bender Steven S. | Key sequence rhythm recognition system and method |
US7206938B2 (en) * | 2002-09-24 | 2007-04-17 | Imagic Software, Inc. | Key sequence rhythm recognition system and method |
US20080034218A1 (en) * | 2002-09-24 | 2008-02-07 | Bender Steven L | Key sequence rhythm guidance recognition system and method |
US7802103B2 (en) * | 2002-09-24 | 2010-09-21 | Imagic Software, Inc. | Key sequence rhythm recognition system and method |
US20070162763A1 (en) * | 2002-09-24 | 2007-07-12 | Bender Steven S | Key sequence rhythm recognition system and method |
US7756816B2 (en) | 2002-10-02 | 2010-07-13 | Jpmorgan Chase Bank, N.A. | System and method for network-based project management |
US8301493B2 (en) | 2002-11-05 | 2012-10-30 | Jpmorgan Chase Bank, N.A. | System and method for providing incentives to consumers to share information |
US20040088219A1 (en) * | 2002-11-05 | 2004-05-06 | First Usa Bank, N.A. | System and method for providing incentives to consumers to share information |
US20040153418A1 (en) * | 2003-02-05 | 2004-08-05 | Hanweck Gerald Alfred | System and method for providing access to data from proprietary tools |
US20050001712A1 (en) * | 2003-07-03 | 2005-01-06 | Yarbrough Craig D. | RF ID tag |
US20050055555A1 (en) * | 2003-09-05 | 2005-03-10 | Rao Srinivasan N. | Single sign-on authentication system |
US8345427B2 (en) | 2004-04-09 | 2013-01-01 | Netlist, Inc. | Module having at least two surfaces and at least one thermally conductive layer therebetween |
US20100110642A1 (en) * | 2004-04-09 | 2010-05-06 | Netlist, Inc. | Module having at least two surfaces and at least one thermally conductive layer therebetween |
US7630202B2 (en) | 2004-04-09 | 2009-12-08 | Netlist, Inc. | High density module having at least two substrates and at least one thermally conductive layer therebetween |
US20110110047A1 (en) * | 2004-04-09 | 2011-05-12 | Netlist, Inc. | Module having at least two surfaces and at least one thermally conductive layer therebetween |
US20080316712A1 (en) * | 2004-04-09 | 2008-12-25 | Pauley Robert S | High density module having at least two substrates and at least one thermally conductive layer therebetween |
US7839645B2 (en) | 2004-04-09 | 2010-11-23 | Netlist, Inc. | Module having at least two surfaces and at least one thermally conductive layer therebetween |
US20090016573A1 (en) * | 2004-09-14 | 2009-01-15 | Mcafee Ii Kenneth N | Bioindex mechanism for increasing the relative speed of biometric indentification against large population samples |
US7474769B1 (en) * | 2004-09-14 | 2009-01-06 | Unisys Corporation | Bioindex mechanism for increasing the relative speed of biometric identification against large population samples |
US7804956B2 (en) * | 2004-10-15 | 2010-09-28 | Industrial Technology Research Institute | Biometrics-based cryptographic key generation system and method |
US20060083372A1 (en) * | 2004-10-15 | 2006-04-20 | Industrial Technology Research Institute | Biometrics-based cryptographic key generation system and method |
US20060095789A1 (en) * | 2004-11-03 | 2006-05-04 | International Business Machines Corporation | Method and system for establishing a biometrically enabled password |
US7506174B2 (en) | 2004-11-03 | 2009-03-17 | Lenovo (Singapore) Pte Ltd. | Method and system for establishing a biometrically enabled password |
US20060190723A1 (en) * | 2005-02-18 | 2006-08-24 | Jp Morgan Chase Bank | Payload layer security for file transfer |
US20060293891A1 (en) * | 2005-06-22 | 2006-12-28 | Jan Pathuel | Biometric control systems and associated methods of use |
US8033836B1 (en) | 2005-08-29 | 2011-10-11 | Netlist, Inc. | Circuit with flexible portion |
US8864500B1 (en) | 2005-08-29 | 2014-10-21 | Netlist, Inc. | Electronic module with flexible portion |
US7811097B1 (en) | 2005-08-29 | 2010-10-12 | Netlist, Inc. | Circuit with flexible portion |
US8583926B1 (en) | 2005-09-19 | 2013-11-12 | Jpmorgan Chase Bank, N.A. | System and method for anti-phishing authentication |
US9374366B1 (en) | 2005-09-19 | 2016-06-21 | Jpmorgan Chase Bank, N.A. | System and method for anti-phishing authentication |
US10027707B2 (en) | 2005-09-19 | 2018-07-17 | Jpmorgan Chase Bank, N.A. | System and method for anti-phishing authentication |
US9661021B2 (en) | 2005-09-19 | 2017-05-23 | Jpmorgan Chase Bank, N.A. | System and method for anti-phishing authentication |
US7839643B1 (en) | 2006-02-17 | 2010-11-23 | Netlist, Inc. | Heat spreader for memory modules |
US8488325B1 (en) | 2006-02-17 | 2013-07-16 | Netlist, Inc. | Memory module having thermal conduits |
US7619893B1 (en) | 2006-02-17 | 2009-11-17 | Netlist, Inc. | Heat spreader for electronic modules |
US9344421B1 (en) | 2006-05-16 | 2016-05-17 | A10 Networks, Inc. | User access authentication based on network access point |
US8793490B1 (en) | 2006-07-14 | 2014-07-29 | Jpmorgan Chase Bank, N.A. | Systems and methods for multifactor authentication |
US9240012B1 (en) | 2006-07-14 | 2016-01-19 | Jpmorgan Chase Bank, N.A. | Systems and methods for multifactor authentication |
US9679293B1 (en) | 2006-07-14 | 2017-06-13 | Jpmorgan Chase Bank, N.A. | Systems and methods for multifactor authentication |
US9497201B2 (en) | 2006-10-17 | 2016-11-15 | A10 Networks, Inc. | Applying security policy to an application session |
US9954868B2 (en) | 2006-10-17 | 2018-04-24 | A10 Networks, Inc. | System and method to associate a private user identity with a public user identity |
US9060003B2 (en) | 2006-10-17 | 2015-06-16 | A10 Networks, Inc. | System and method to associate a private user identity with a public user identity |
US9712493B2 (en) | 2006-10-17 | 2017-07-18 | A10 Networks, Inc. | System and method to associate a private user identity with a public user identity |
US9294467B2 (en) | 2006-10-17 | 2016-03-22 | A10 Networks, Inc. | System and method to associate a private user identity with a public user identity |
US20080123300A1 (en) * | 2006-11-29 | 2008-05-29 | International Business Machines Corporation | Folded-sheet-metal heatsinks for closely packaged heat-producing devices |
US7474529B2 (en) | 2006-11-29 | 2009-01-06 | International Business Machines Corporation | Folded-sheet-metal heatsinks for closely packaged heat-producing devices |
US8726011B1 (en) | 2007-05-17 | 2014-05-13 | Jpmorgan Chase Bank, N.A. | Systems and methods for managing digital certificates |
US8473735B1 (en) | 2007-05-17 | 2013-06-25 | Jpmorgan Chase | Systems and methods for managing digital certificates |
US10706111B1 (en) | 2007-06-27 | 2020-07-07 | ENORCOM Corporation | Wearable electronic device with multiple detachable components |
US9201885B1 (en) | 2007-06-27 | 2015-12-01 | ENORCOM Corporation | Multi-platform storage and user interface environment |
US10762061B1 (en) | 2007-06-27 | 2020-09-01 | ENORCOM Corporation | Time-based information system |
US11366863B1 (en) | 2007-06-27 | 2022-06-21 | ENORCOM Corporation | Configurable electronic system with detachable components |
US9509674B1 (en) | 2007-06-27 | 2016-11-29 | ENORCOM Corporation | Information security and privacy system and method |
US9542493B1 (en) * | 2007-06-27 | 2017-01-10 | ENORCOM Corporation | Data system with temporal user interface |
US11726966B1 (en) | 2007-06-27 | 2023-08-15 | ENORCOM Corporation | Information management system |
US10368241B1 (en) | 2007-06-27 | 2019-07-30 | ENORCOM Corporation | Security for mobile and stationary electronic systems |
US8868036B1 (en) * | 2007-06-27 | 2014-10-21 | ENORCOM Corporation | Security for mobile system |
US10911952B1 (en) | 2007-06-27 | 2021-02-02 | ENORCOM Corporation | Autonomous assistant for mobile and stationary environments |
US8321682B1 (en) | 2008-01-24 | 2012-11-27 | Jpmorgan Chase Bank, N.A. | System and method for generating and managing administrator passwords |
US8549315B2 (en) | 2008-01-24 | 2013-10-01 | Jpmorgan Chase Bank, N.A. | System and method for generating and managing administrator passwords |
US8018723B1 (en) | 2008-04-30 | 2011-09-13 | Netlist, Inc. | Heat dissipation for electronic modules |
US8705239B1 (en) | 2008-04-30 | 2014-04-22 | Netlist, Inc. | Heat dissipation for electronic modules |
US8670598B2 (en) * | 2008-11-21 | 2014-03-11 | Robert Bosch Gmbh | Device for creating and/or processing an object signature, monitoring device, method and computer program |
US20110019871A1 (en) * | 2008-11-21 | 2011-01-27 | Robert Bosch Gmbh | Device for creating and/or processing an object signature, monitoring device, method and computer program |
US9608826B2 (en) | 2009-06-29 | 2017-03-28 | Jpmorgan Chase Bank, N.A. | System and method for partner key management |
US10762501B2 (en) | 2009-06-29 | 2020-09-01 | Jpmorgan Chase Bank, N.A. | System and method for partner key management |
US9825761B2 (en) * | 2010-04-06 | 2017-11-21 | King Saud University | Systems and methods improving cryptosystems with biometrics |
US20110246768A1 (en) * | 2010-04-06 | 2011-10-06 | King Saud University | Systems and methods improving cryptosystems with biometrics |
US10042818B2 (en) | 2012-01-30 | 2018-08-07 | International Business Machines Corporation | Tracking entities by means of hash values |
US9600443B2 (en) | 2012-01-30 | 2017-03-21 | International Business Machines Corporation | Tracking entities by means of hash values |
US9419957B1 (en) | 2013-03-15 | 2016-08-16 | Jpmorgan Chase Bank, N.A. | Confidence-based authentication |
US10339294B2 (en) | 2013-03-15 | 2019-07-02 | Jpmorgan Chase Bank, N.A. | Confidence-based authentication |
US9825943B2 (en) | 2013-06-24 | 2017-11-21 | A10 Networks, Inc. | Location determination for user authentication |
US9398011B2 (en) | 2013-06-24 | 2016-07-19 | A10 Networks, Inc. | Location determination for user authentication |
US10158627B2 (en) | 2013-06-24 | 2018-12-18 | A10 Networks, Inc. | Location determination for user authentication |
CN104346161A (en) * | 2013-08-09 | 2015-02-11 | 联想(北京)有限公司 | Information processing method and electronic equipment |
CN104346161B (en) * | 2013-08-09 | 2017-12-29 | 联想(北京)有限公司 | The method and electronic equipment of a kind of information processing |
EP3078003A4 (en) * | 2013-12-02 | 2017-08-02 | Identity Authentication Management | Methods and systems for multi-key veritable biometric identity authentication |
US11165770B1 (en) | 2013-12-06 | 2021-11-02 | A10 Networks, Inc. | Biometric verification of a human internet user |
US10148726B1 (en) | 2014-01-24 | 2018-12-04 | Jpmorgan Chase Bank, N.A. | Initiating operating system commands based on browser cookies |
US10686864B2 (en) | 2014-01-24 | 2020-06-16 | Jpmorgan Chase Bank, N.A. | Initiating operating system commands based on browser cookies |
US20160255055A1 (en) * | 2015-01-29 | 2016-09-01 | Google Inc. | Controlling Access To Resource Functions At A Control Point Of The Resource Via A User Device |
US9584489B2 (en) * | 2015-01-29 | 2017-02-28 | Google Inc. | Controlling access to resource functions at a control point of the resource via a user device |
US11449589B2 (en) * | 2017-03-13 | 2022-09-20 | Fingerprint Cards Anacatum Ip Ab | Updating biometric data templates |
US20200042684A1 (en) * | 2017-03-13 | 2020-02-06 | Fingerprint Cards Ab | Updating biometric data templates |
US10789593B2 (en) | 2017-07-31 | 2020-09-29 | Alibaba Group Holding Limited | Biometric feature database establishing method and apparatus |
US11544711B2 (en) | 2017-07-31 | 2023-01-03 | Advanced New Technologies Co., Ltd. | Biometric feature database establishing method and apparatus |
Also Published As
Publication number | Publication date |
---|---|
DE60025326T2 (en) | 2006-08-31 |
CN1338167A (en) | 2002-02-27 |
CN100414867C (en) | 2008-08-27 |
CZ20012673A3 (en) | 2002-02-13 |
ES2254131T3 (en) | 2006-06-16 |
JP2002536876A (en) | 2002-10-29 |
AU2118000A (en) | 2000-08-18 |
HUP0105304A2 (en) | 2002-04-29 |
TW511362B (en) | 2002-11-21 |
PL364730A1 (en) | 2004-12-13 |
DE60025326D1 (en) | 2006-03-30 |
ATE315293T1 (en) | 2006-02-15 |
EP1145484A1 (en) | 2001-10-17 |
IL143855A (en) | 2006-06-11 |
WO2000045551A1 (en) | 2000-08-03 |
IL143855A0 (en) | 2002-04-21 |
JP4106188B2 (en) | 2008-06-25 |
CZ300144B6 (en) | 2009-02-25 |
IL144196A0 (en) | 2002-05-23 |
EP1145484B1 (en) | 2006-01-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US6507912B1 (en) | Protection of biometric data via key-dependent sampling | |
US7114080B2 (en) | Architecture for secure remote access and transmission using a generalized password scheme with biometric features | |
KR101226651B1 (en) | User authentication method based on the utilization of biometric identification techniques and related architecture | |
Xi et al. | A fingerprint based bio‐cryptographic security protocol designed for client/server authentication in mobile computing environment | |
KR100353731B1 (en) | User authenticating system and method using one-time fingerprint template | |
US8443201B2 (en) | Biometric authentication system, enrollment terminal, authentication terminal and authentication server | |
US7024562B1 (en) | Method for carrying out secure digital signature and a system therefor | |
US20140298412A1 (en) | System and Method for Securing a Credential via User and Server Verification | |
WO2001092994A2 (en) | Method for biometric encryption of e-mail | |
KR20070024569A (en) | Architectures for privacy protection of biometric templates | |
JP2008541633A (en) | Electronic passport authentication protocol with enhanced privacy | |
CN101420301A (en) | Human face recognizing identity authentication system | |
AU2003247117B2 (en) | System and apparatus for authenticating to a system or network | |
JP2001052182A (en) | Personal authenticating method and recording medium recording personal authentication program | |
Khalid et al. | Cloud server security using bio-cryptography | |
WO2000000882A2 (en) | Apparatus and method for end-to-end authentication using biometric data | |
JP6151627B2 (en) | Biometric authentication system, biometric authentication method, and computer program | |
Chakraborty et al. | Generation and verification of digital signature with two factor authentication | |
Fan et al. | NIS03-6: Remote Password Authentication Scheme with Smart Cards and Biometrics | |
Deswarte et al. | The challenges raised by the privacy-preserving identity card | |
Das et al. | A simple and secure authentication and key establishment protocol | |
JP2004272551A (en) | Certificate for authentication and terminal equipment | |
Sukumaran et al. | Critical File Access in Wireless Networks Using Multifactor Authentication |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: INTERNATIONAL BUSINESS MACHINES CORPORATION, NEW Y Free format text: (ASSIGNMENT OF ASSIGNOR'S INTEREST) RE-RECORD TO CORRECT THE NUMBER OF MICROFILM PAGES FROM 3 TO 4 AT REEL 9887, FRAME 001;ASSIGNORS:MATYAS, STEPHEN MICHAEL JR.;PEYRAVIAN, MOHAMMAD;REEL/FRAME:010002/0657;SIGNING DATES FROM 19990319 TO 19990405 Owner name: INTERNATIONAL BUSINESS MACHINES CORPORATION, NEW Y Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:MATYAS, STEPHEN MICHAEL JR.;PEYRAVIAN, MOHAMMAD;REEL/FRAME:009887/0001;SIGNING DATES FROM 19990319 TO 19990405 |
|
FEPP | Fee payment procedure |
Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
FPAY | Fee payment |
Year of fee payment: 4 |
|
FPAY | Fee payment |
Year of fee payment: 8 |
|
REMI | Maintenance fee reminder mailed | ||
FPAY | Fee payment |
Year of fee payment: 12 |
|
SULP | Surcharge for late payment |
Year of fee payment: 11 |